Reference List for Engineering Trustworthy Cyber-Physical...
-
Upload
vuonghuong -
Category
Documents
-
view
212 -
download
0
Transcript of Reference List for Engineering Trustworthy Cyber-Physical...
Prof. Dr. Frank J. Furrer
Reference List for “Engineering Trustworthy Cyber-Physical Systems”
Version 0.2 / 2.4.2019
Alberts19 Christopher Alberts and Carol Woody:
An Approach for integrating the Security Engineering Risk Analysis (SERA) Method with Threat Modeling
Software Engineering Institute (SEI), White Paper, February 2019.
Downloadable from:
https://resources.sei.cmu.edu/asset_files/WhitePaper/2019_019_
001_539814.pdf [last accessed: 21.2.2019]
Allocco10 Michael Allocco:
Safety Analyses of Complex Systems – Considerations of Software, Firmware, Hardware, Human, and the Environment
John Wiley & Sons, Inc., N.Y., USA, 2010. ISBN 978-0-470-58770-
6
Alur15 Rajeev Alur:
Principles of Cyber-Physical Systems
MIT Press, USA, 2015. ISBN 978-0-262-02911-7
Aroms12 Emmanuel Aroms:
NIST Special Publication 800-55 Rev1: Security Metrics Guide
for Information Technology Systems
CreateSpace Independent Publishing Platform, 2012. ISBN 978-1-
4701-5204-8
Axelrod13 C. Warren Axelrod:
Engineering Safe and Secure Software Systems
Artech House, Norwood, USA, 2013. ISBN 978-1-60807-472-3
Axelsson15 Jakob Axelsson:
Safety Analysis for Systems-of-Systems
ERCIM NEWS, Number 102 July 2015. Special theme “Trustworthy
Systems of Systems”, p. 22-23. Downloadable from:
https://ercim-news.ercim.eu/images/stories/EN102/EN102-
web.pdf [last accessed: 7.9.2018]
Bondavalli16 Andrea Bondavalli, Sara Bouchenak, Hermann Kopetz (Editors):
Cyber-Physical Systems of Systems: Foundations - A
Conceptual Model and Some Derivations: The AMADEOS
Legacy
Springer Lecture Notes in Computer Science, Heidelberg, Germany,
2016. ISBN 978-3-319-47589-9
Brotby08 W. Krag Brotby:
Information Security Management Metrics - A Definitive Guide
to Effective Security Monitoring and Measurement
Taylor & Francis Ltd, 2008. ISBN 978-1-420-05285-5
Brotby13 W. Krag Brotby, Gary Hinson:
PRAGMATIC Security Metrics - Applying Metametrics to
Information Security Taylor & Francis Ltd., 2013. ISBN 978-1-
439-88152-1
Buchanan02 Robert Buchanan:
Disaster Proofing Information Systems – A Complete
Methodology for Eliminating Single Points of Failure
McGraw-Hill Education, USA, 2002. ISBN 978-0-071-40922-3
Butler07 Michael Butler, Cliff Jones, Alexander Romanovsky, Elena Troubytsina (Editors):
Rigorous Development of Complex Fault-Tolerant Systems
Springer-Verlag, Berlin (Lecture Notes in Computer Science, Band
4157), 2007. ISBN 978-3-540-48265-9
Butler10 Michael Butler, Cliff B. Jones, Alexander Romanovsky, Elena Troubitsyna:
Methods, Models and Tools for Fault Tolerance
Springer-Verlag, Berlin Heidelberg (Lecture Notes in Computer
Science, Band 5454), 2010). ISBN 978-3-642-00866-5
Cappelli12 Dawn M. Cappelli, Andrew P. Moore, Randall F. Trzeciak:
The CERT Guide to Insider Threats – How to Prevent, Detect, and Respond to Information Technology Crimes
Addison Wesley, N.J., USA (SEI Series in Software Engineering),
2012. ISBN 978-0-321-81257-5
Corera17 Gordon Corera:
Cyberspies – The Secret History of Surveillance, Hacking, and Digital Espionage
Pegasus Books, 2017. ISBN 978-1-6817-7459-6
Day17 Ronald William Day:
Design Error – A Human Factors Approach
Taylor and Francis (CRC Press), Boca Raton, FL, USA, 2017. ISBN
978-1-4987-8367-5
Dearden18 Harvey T. Dearden:
Functional Safety In Practice
CreateSpace Independent Publishing Platform, 2nd edition, 2018.
ISBN 978-1-9782-4641-6
DeSilva15 Eugenie De Silva (Editor):
National Security and Counterintelligence in the Era of Cyber
Espionage
Information Science Reference (Advances in Digital Crime,
Forensics, and Cyber Terrorism), 2015. ISBN 978-1-4666-9661-7
Diogenes18 Yuri Diogenes, Erdal Ozkaya:
Cybersecurity – Attack and Defense Strategies: Infrastructure
Security with Red Team and Blue Team Tactics
Packt Publishing Inc., Birmingham, UK, 2018. ISBN 978-1-7884-
7529-7
Dubrova13 Elena Dubrova:
Fault-Tolerant Design
Springer-Verlag, 2013. ISBN 978-1-461-42112-2
Elisan15 Christopher C. Elisan:
Advanced Malware Analysis
McGraw-Hill Education Ltd., 2015. ISBN 978-0-071-81974-9
ERCIM15 ERCIM NEWS, Number 102 July 2015. Special theme “Trustworthy
Systems of Systems”. Downloadable from:
https://ercim-news.ercim.eu/images/stories/EN102/EN102-
web.pdf [last accessed: 7.9.2018]
Farley17 John Farley:
Online and Under Attack – What Every Business Needs To Do
Now To Manage Cyber Risk and Win Its Cyber War
CreateSpace Independent Publishing Platform, 2017. ISBN 978-1-
5423-4290-2
Fernandez-Buglioni13
Eduardo Fernandez-Buglioni
Security Patterns in Practice: Designing Secure Architectures
Using Software Patterns
John Wiley & Sons, USA, 2013. ISBN 978-1-119-99894-5
Fiaschetti18 Andrea Fiaschetti, Josef Noll, Paolo Azzoni, Roberto Uribeetxeberria (Editors):
Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems – The SHIELD
Methodology
Taylor & Francis Ltd., USA, 2018. ISBN 978-1-138-04275-9
Flammini12 Francesco Flammini (Edotir):
Railway Safety, Reliability, and Security – Technologies and Systems Engineering
Information Science Reference (IGI Global), PA, USA, 2012. ISBN
978-1-4666-1643-1
Flammini18 Francesco Flammini (Editor):
Resilience of Cyber-Physical Systems – From Risk Modelling to Threat Counteraction
Springer-Verlag, 2018. ISBN 978-3-319-95596-4
Flammini19 Francesco Flammini (Editor):
Resilience of Cyber-Physical Systems – From Risk
Modelling to Threat Counteraction
Springer-Verlag, 2019. ISBN 978-3-319-95596-4
Francis14 Royce Francis, Behailu Bekera:
A metric and frameworks for resilience analysis of
engineered and infrastructure systems
Reliability Engineering and System Safety, 121 (2014), pp. 90 –
103. Downloadable from:
https://blogs.gwu.edu/seed/files/2012/07/Reliability-
Engineering-and-System-Safety-2014-Francis-1y5jkh9.pdf [last
accessed 3.9.2017]
Freund14 Jack Freund, Jack Jones:
Measuring and Managing Information Risk - A FAIR Approach
Butterworth-Heinemann Publisher, 2014. ISBN 978-0-124-20231-
3
Goloubeva06 Olga Goloubeva, Maurizio Rebaudengo, Matteo Sonza Reorda, Massimo Violante:
Software-Implemented Hardware Fault Tolerance
Springer-Verlag, 2006. ISBN 978-0-387-26060-0
Goodman15 Marc Goodman:
Future Crimes – Everything Is Connected, Everyone Is
Vulnerable and What We Can Do About It
Doubleday Publisher, USA, 2015. ISBN 978-0-385-53900-5
Griffor16 Edward Griffor:
Handbook of System Safety and Security – Cyber Risk and
Risk Management, Cyber Security, Threat Analysis,
Functional Safety, Software Systems, and Cyber Physical
Systems
Syngress Media, USA, 2016. ISBN 978-0-1280-3773-7
Gudera16 Andy Gudera:
Beware of Car Hacking – A Systematic Analysis
tredition GmbH, Hamburg, 2016. ISBN 978-3-7323-6368-1
Gullo18 Louis J. Gullo, Jack Dixon (Editors):
Design for Safety
John Wiley & Sons, Hoboken, NJ, USA, 2018. ISBN 978-1-118-
97429-2
Gumzej18 Roman Gumzej:
Engineering Safe and Secure Cyber-Physical Systems – The Specification PEARL Approach
Springer International Publishing, Switzerland, 2018 (Softcover reprint of the original 1st ed. 2016. ISBN 978-3-319-80454-5
Gutteridge18 Lance Gutteridge:
Avoiding IT Disasters – Fallacies about enterprise systems
and how you can rise above them
Thinking Works, 2018. ISBN978-1-7753-5750-6
Hanmer07 Robert Hanmer:
Patterns for Fault Tolerant Software
John Wiley & Sons, USA, 2007. ISBN 978-0-470-31979-6
Hanssen18 Geir Kjetil Hanssen, Tor Stålhane, Thor Myklebust:
SafeScrum – Agile Development of Safety-Critical Software
Springer-Verlag, Germany, 2018. ISBN 978-3-319-99333-1
Hayden10 Lance Hayden:
IT Security Metrics - A Practical Framework for Measuring
Security and Protecting Data
McGraw-Hill Education Ltd., 2010. ISBN 978-0-071-71340-5
Herrmann07 Debra S. Herrmann:
Complete Guide to Security and Privacy Metrics - Measuring
Regulatory Compliance, Operational Resilience, and ROI
Auerbach Publishers Inc., 2007. ISBN 978-0-8493-5402-1
Hobbs15 Chris Hobbs:
Embedded Software Development for Safety-Critical Systems
Taylor & Francis, Inc., USA, 2015. ISBN 978-1-498-72670-2
Hodson19 Christopher Hodson
Cyber Risk Management
Kogan Page, 2019. ISBN 978-0-749-48412-5
Hoffman14 Jeff Hoffman:
Intruders at the Gate – Building an Effective Malware Defense
System
CreateSpace Independent Publishing Platform, 2014. ISBN 978-1-
5004-7957-2
Hole16 Kjell Jørgen Hole:
Anti-fragile ICT Systems
Springer-Verlag, 2016. ISBN 978-3-319-30068-9
Hollnagel06 Erik Hollnagel, David D. Woods, Nancy Leveson (Editors):
Resilience Engineering – Concepts and Precepts
Ashgate Publishing Ltd., Aldershot, UK, 2006. ISBN 978-0-7546-
4904-5
Hollnagel13 Erik Hollnagel, Jean Paries, David D. Woods, John Wreathall:
Resilience Engineering in Practice – A Guidebook
CRC Press, New edition, 2013. ISBN 978-1-472-42074-9
Hollnagel14 Erik Hollnagel:
Safety-I and Safety-II – The Past and Future of Safety
Management
Routledge Publishing, New edition, 2014. ISBN 978-1-4724-2308-5
Hopkin18 Paul Hopkin:
Fundamentals of Risk Management – Understanding,
Evaluating and Implementing Effective Risk Management
Kogan Page, 5th edition, 2018. ISBN 978-0-749-48307-4
Hsu18 Tony Hsu:
Hands-On Security in DevOps – Ensure continuous Security,
Deployment, and Delivery with DevSecOps
Packt Publishing, Birmingham, UK, 2018. ISBN 978-1-788995-50-
4
Hubbard16 Douglas W. Hubbard, Richard Seiersen:
How to Measure Anything in Cybersecurity Risk
John Wiley & Sons, Inc., 2016. ISBN 978-1-119-08529-4
Jackson10 Scott Jackson:
Architecting Resilient Systems – Accident Avoidance and
Survival and Recovery from Disruptions
John Wiley & Sons, Inc., New Jersey, USA, 2010. ISBN 978-0-470-
40503-1
Jain17 Tushar Jain, Joseph J. Yamé, Dominique Sauter:
Active Fault-Tolerant Control Systems – A Behavioral System
Theoretic Perspective
Springer-Verlag, 2017. ISBN 978-3-319-68827-5
Jamshidi09a Mo Jamshidi (Editor):
Systems of Systems Engineering – Principles and Applications
CRC Press, Taylor & Francis Group, Boca Raton, USA, 2009. ISBN
978-1-4200-6588-6
Jamshidi09b Mo Jamshidi (Editor):
Systems of Systems Engineering – Innovations for the 21st
Century
John Wiley & Sons Inc., Hoboken, New Jersey, USA, 2009. ISBN 978-0-470-19590-1
Janicak15 Christopher A. Janicak:
Safety Metrics - Tools and Techniques for Measuring Safety
Performance Bernan Print, Revised edition, 2015. ISBN 978-1-
5988-8754-9
Jaquith07 Andrew Jaquith:
Security Metrics - Replacing Fear, Uncertainty, and Doubt
Addison-Wesley Professional, USA, 2007. ISBN 978-0-321-34998-9
Johnson18 Anne Frances Johnson et. al.:
Recoverability as a First-Class Security Objective
National Academies Press, Washington, USA. Proceedings of a
Workshop, 2018. ISBN 978-0-309-48370-4. Downloadable from:
https://www.nap.edu/download/25240 [last accessed: 1.10.2018]
Josephsen13 David Josephsen:
Nagios – Building Enterprise-Grade Monitoring Infrastructures for Systems and Networks
Prentice Hall Inc., USA, 2nd edition, 2013. ISBN 978-0-133-13573-
2
Julian17 Mike Julian:
Practical Monitoring – Effective Strategies for the Real World
O'Reilly UK Ltd., 2017. ISBN 978-1-491-95735-6
Kaplan15 James M. Kaplan, Tucker Bailey, Derek O'Halloran, Alan Marcus, Chris Rezek:
Beyond Cybersecurity – Protecting Your Digital Business
John Wiley & Sons Inc., N.J., USA, 2015. ISBN 978-1-119-02684-6
Killmeyer06 Jan Killmeyer:
Information Security Architecture - An Integrated Approach
To Security in The Organization
Auerbach Publishers Inc., USA, 2006. ISBN 978-0-849-31549-7
Kim16 Gene Kim, John Willis, Patrick Debois, Jez Humble, John Willis:
The DevOPS Handbook – How to Create World-Class Agility,
Reliability, and Security in Technology Organizations
IT Revolution Press, Portland, USA, 2016. ISBN 978-1-942788-00-3
King01 Christopher M. King, Curtis E. Dalton), T. E. Osmanoglu:
Security Architecture – Design, Deployment and Applications
Mcgraw-Hill Professional, USA, 2001. ISBN 978-0-072-13385-1
Knight12 John Knight:
Fundamentals of Dependable Computing for Software
Engineers
Chapman and Hall/CRC, Inc., USA, 2012. ISBN 978-1-439-86255-
1
Knight14 John C. Knight:
Fundamentals of Dependable Computing
Tutorial ICSE 2014, 2014. Downloadable from:
http://2014.icse-
conferences.org/sites/default/files/icse.tutorial.session.1.pdf [last
accessed 14.8.2017]
Knight19 Alissa Knight:
Hacking Connected Cars – Tactics, Techniques, and
Procedures
John Wiley & Sons Inc., USA, 2019. ISBN 978-1-119-49180-4
Koç18 Çetin Kaya Koç (Editor):
Cyber-Physical Systems Security
Springer Nature Switzerland, Cham, 2018. ISBN 978-3-319-98934-
1
Koehler17 Thomas R. Koehler:
Understanding Cyber Risk – Protecting Your Corporate Assets
Routledge Chapman Hall Publishing, USA, 2017. ISBN 978-1-472-47779-8
Koren07 Israel Koren, C. Mani Krishna:
Fault-Tolerant Systems
Morgan Kaufmann Publishing, USA, 2007. ISBN 978-0-120-88525-1
Kshetri10 Nir Kshetri:
The Global Cybercrime Industry – Economic, Institutional and
Strategic Perspectives
Springer-Verlag, Heidelberg, 2010. ISBN 978-3-642-11521-9
Landoll16 Douglas J. Landoll:
Information Security Policies, Procedures, and Standards – A
Practitioner's Reference
CRC Press, USA, 2016. ISBN 978-1-482-24589-9
Laprie13 Jean-Claude Laprie (Editor):
Dependability: Basic Concepts and Terminology: In English,
French, German, Italian and Japanese
Springer, Germany (Softcover reprint of the original 1st edition
1992), 2013. ISBN 978-3-709-19172-9
Larrey17 Philip Larrey:
Connected World – From Automated Work to Virtual Wars: The
Future, By Those Who Are Shaping It
Portfolio Penguin, UK, 2017. ISBN 978-0-241-30842-4
Laykin13 Erik Laykin:
Investigative Computer Forensics – The Practical Guide for
Lawyers, Accountants, Investigators, and Business Executives
John Wiley & Sons, Inc., USA, 2013. ISBN 978-0-470-93240-7
Lee17 Edward Ashford Lee, Sanjit Arunkumar Seshia:
Introduction to Embedded Systems – A Cyber-Physical
Systems Approach
The MIT Press, Cambridge MA, USA, 2nd edition 2017. ISBN 978-0-
262-53381-2
Leveson11 Nancy G. Leveson:
Engineering a Safer World – Systems Thinking applied to
Safety
MIT Press, Cambridge MA, USA, 2011. ISBN 978-0-262-01662-9
Li17b Shancang Li, Li Da Xu:
Securing the Internet of Things
Syngress Publishing (Elsevier), Cambridge, USA, 2017. ISBN 978-0-12-804458-2
Liska16 Allan Liska, Timothy Gallo:
Ransomware – Defending Against Digital Extortion
O'Reilly Publishing, UK Ltd., 2016. ISBN 978-1-491-96788-1
Little03 David Little, David A. Chapa:
Implementing Backup and Recovery – The Readiness Guide for
the Enterprise
John Wiley & Sons Inc., USA, 2003. ISBN 978-0-471-22714-4
Loukas15 George Lukas:
Cyber-Physical Attacks – A Growing Invisible Threat
Butterworth-Heinemann (Elsevier), Oxford, UK, 2015.
ISBN 978-0-12-801290-1
Luzeaux11 Dominique Luzeaux, Jean-René Ruault, Jean-Luc Wipplere
(Editors):
Complex Systems and Systems of Systems Engineering
iSTE Publishing Ltd., London UK, 2011. Distributed by John Wiley & Sons Inc., N.Y., USA. ISBN 978-1-848-21253-4
Maguire06 Richard Maguire:
Safety Cases and Safety Reports – Meaning, Motivation and
Management
CRC Press Inc., USA, 2006. ISBN 978-0-754-64649-5
Mahmoud13 Magdi S. Mahmoud, Yuanqing Xia:
Analysis and Synthesis of Fault-Tolerant Control Systems
John Wiley & Sons, Inc., N.Y., USA, 2013. ISBN 978-1-118-54133-
3
Maier06 Phillip Q. Maier:
Audit And Trace Log Management – Consolidation and
Analysis
Auerbach Publishers Inc., USA, 2006. ISBN 978-0-849-32725-4
Mansouri16 Houssem Mansouri:
Fault Tolerance in Mobile and Ad hoc Networks via
Checkpointing
LAP LAMBERT Academic Publishing, 2016. ISBN 978-3-330-
00310-1
Marcus03 Evan Marcus:
Blueprints for High Availability
John Wiley & Sons Inc., USA, 2003. ISBN 978-0-471-43026-1
Marion16 Nancy Marion:
Introduction to Cybercrime – Computer Crimes, Laws, and
Policing in the 21st Century
Praeger Security International, 2016. ISBN 978-1-4408-3533-9
Mateski17 Mark Mateski, Cassandra M. Trevino, Cynthia K. Veitsch, Mark
Harris, Scott Maruoka, Jason Frye:
Cyber Threat Metrics
CreateSpace Independent Publishing Platform, 2017. ISBN 978-1-5424-7775-8
Matulevičius17 Raimundas Matulevičius:
Fundamentals of Secure System Modelling
Springer-Verlag, 2017. ISBN 978-3-319-61716-9
Maurer16 Markus Maurer, J. Christian Gerdes, Barbara Lenz, Hermann
Winnder (Editors):
Autonomous Driving – Technical, Legal and Social Aspects
Springer Verlag, Germany, 2016. ISBN 978-3-662-48845-4
McCormick15 John W McCormick, Peter C. Chapin:
Building High Integrity Applications with SPARK
Cambridge University Press, Cambridge, UK, 2015. ISBN 978-1-
107-65684-0
McKay17 Kerry A. McKay, Larry Bassham, Meltem Sönmez Turan, Nicky Mouha:
Report on Lightweight Cryptography (US National Institute of Standards and Technology Report NISTIR 8114)
CreateSpace Independent Publishing Platform, 2017. ISBN 978-1-
9811-1346-0. Downladable from: https://nvlpubs.nist.gov/nistpubs/ir/2017/NIST.IR.8114.pdf
[last accessed: 9.9.2018]
Mead16 Nancy R. Mead, Carol C. Woody:
Cyber Security Engineering – A Practical Approach for
Systems and Software Assurance
Addison-Wesley Professional, USA, 2016. ISBN 978-0-13-418980-2
Mehan16 Julie E Mehan:
Insider Threat – A Guide to Understanding, Detecting, and
Defending Against the Enemy from Within
IT Governance Publishing, 2016. ISBN 978-1-8492-8839-2
Merkow10 Mark S. Merkow, Lakshmikanth Raghavan:
Secure and Resilient Software Development
Auerbach Publications (Taylor & Francis), FL, USA, 2010. ISBN
978-1-439-82696-6
Merkow11 Mark S. Merkow, Lakshmikanth Raghavan:
Secure and Resilient Software – Requirements, Test Cases, and
Testing Methods
Auerbach Publications (Taylor & Francis), FL, USA, 2011. ISBN
978-1-439-86621-4
Mitnick17 Kevin Mitnick:
The Art of Invisibility – The World's Most Famous Hacker
Teaches You How to Be Safe in the Age of Big Brother and Big Data
Little, Brown and Company, USA, 2017. ISBN 978-0-3165-5454-1
Moeller16 Dietmar P.F. Moeller:
Guide to Computing Fundamentals in Cyber-Physical Systems
Springer-Verlag, 2016. ISBN 978-3-319-25176-9
Moore10 Robert Moore:
Cybercrime – Investigating High-Technology Computer Crime
Anderson Publishing, Oxon, UK, 2nd edition, 2010. ISBN 978-1-
4377-5582-4
Myklebust18 Thor Myklebust, Tor Stålhane:
The Agile Safety Case
Springer-Verlag, 2018. ISBN 978-3-319-70264-3
Nakajima17 Shin Nakajima, Jean-Pierre Talpin, Masumi Toyoshima, Huafeng
Yu (Editors):
Cyber-Physical System Design from an Architecture Analysis
Viewpoint (Communications of NII Shonan Meetings)
Springer Nature Singapore Pte Ltd., 2017. ISBN 978-981-10-4435-9
Nathan05 Ron Ben Nathan:
Implementing Database Security and Auditing
Elsevier Digital Press, Oxford, UK, 2005. ISBN 1-55558-334-2
Northrop06 Linda Northrop et. al.:
Ultra-Large-Scale Systems – The Software Challenge of the
Future
Carnegie Mellon SEI (Software Engineering Institute), 2006. ISBN
978-0-9786-956-0-6. Downloadable from: https://resources.sei.cmu.edu/asset_files/Book/2006_014_001_3
0542.pdf [last accessed 15.9.2018]
O'Neil17 Cathy O'Neil:
Weapons of Math Destruction – How Big Data Increases
Inequality and Threatens Democracy
Penguin Publishing, USA, 2017. ISBN 978-0-141-98541-1
Oriyano16 Sean-Philip Oriyano:
Penetration Testing Essentials
Sybex (John Wiley & Sons., Indiana), USA, 2016. ISBN 978-1-119-23530-9
Orondo14 Omondi Orondo:
Identity and Access Management – A Systems Engineering
Approach
CreateSpace Independent Publishing Platform, 2014. ISBN 978-1-
4993-5706-6
Owen19 Tim Owen, Wayne Noble, Faye Christabel Speed:
New Perspectives on Cybercrime
(Palgrave Studies in Cybercrime and Cybersecurity)
Palgrave Macmillan Publishing, USA, 2019. ISBN 978-3-319-85258-4
Paar10 Christof Paar, Jan Pelzl:
Understanding Cryptography – A Textbook for Students and
Practitioners
Springer-Verlag, 2010. ISBN 978-3-642-04100-6
Pelliccione07 P. Pelliccione, H. Muccini, N. Guelfi, A. Romanofsky:
Software Engineering and Fault Tolerant Systems
World Scientific Publishing Inc., Singapore, 2007. ISBN 978-9-
8127-0503-7
Peltier04 Thomas R. Peltier:
Information Security Policies and Procedures - A Practitioner's
Reference
Taylor & Francis Ltd, USA, 2nd edition, 2004. ISBN 978-0-8493-
1958-7
Pont17 Michael J. Pont:
The Engineering of Reliable Embedded Systems – Developing
Software for 'Sil 0' to 'Sil 3' Designs Using Time-Triggered
Architectures
SafeTTy Systems Ltd., Great Dalby, UK, 2017. ISBN 978-0-9930-3554-8
Poschmann09 Axel Poschmann:
Lightweight cryptography – Cryptographic Engineering for a
Pervasive World
Bochumer Universitätsverlag Westdeutscher Universitätsverlag,
Germany, 2009. ISBN 978-3-89966-341-9
Proctor02 Paul E. Proctor, F. Christian Byrnes:
The Secured Enterprise – Protecting Your Information Assets
Prentice Hall Publishing, USA, 2002. ISBN 978-0-130-61906-8
Pullum01 Laura L. Pullum:
Software Fault Tolerance Techniques and Implementation
Artech House Publishing, USA, 2001. ISBN 978-1-580-53137-5
Rajkumar17 Raj Rajkumar, Dionisio De Niz, Mark Klein:
Cyber-Physical Systems
Addison-Wesley, Boston, USA, 2017. ISBN 978-0-321-92696-8
Ransome13 James Ransome, Anmol Misra:
Core Software Security – Security at the Source
Taylor & Francis Ltd., USA, 2013. ISBN 978-1-466-56095-6
Rerup18 Neil Rerup, Milad Aslaner:
Hands-On Cybersecurity for Architects – Plan and Design
Robust Scurity Architectures
Packt Publishing, Birmingham, UK, 2018. ISBN 978-1-7888-3026-3
Riascos10 Luis A.M. Riascos, Paulo E. Miyagi:
Fault Tolerance in Manufacturing Systems – Applying Petri
Nets
VDM Verlag Dr. Müller, Germany, 2010. ISBN 978-3-6392-7556-8
Rierson13 Leanna Rierson:
Developing Safety-Critical Software – A Practical Guide for
Aviation Software and DO-178C Compliance
Taylor & Francis, Inc., USA, 2013. ISBN 978-1-439-81368-3
Romanovsky17 Alexander Romanovsky, Fuyuki Ishikawa (Editors):
Trustworthy Cyber-Physical Systems Engineering
CRC Press, Boca Raton FL, USA, 2017. ISBN 978-1-4978-4245-0
Rushby01 John M. Rushby:
Bus-Architectures for Safety-Critical Embedded Systems
EMSOFT 01 Proceedings of the first International Workshop on
Embedded Software, October 8-10, 2001, pp. 306-323. Springer-Verlag, Berlin. ISBN 3-540-42673-6
Sabella18 Anthony Sabella, Rik Irons-Mclean, Marcelo Yannuzzi:
Orchestrating and Automating Security for the Internet of
Things – Delivering Advanced Security Capabilities from Edge
to Cloud for IoT
Cisco Systems Inc., USA, 2018. ISBN 978-1-5871-4503-2
SASWG19 Safety of Autonomous Systems Working Group (SASWG):
Safety Assurance Objectives for Autonomous Systems
SASWG, 2019. ISBN 978-1-79042-122-0
Saxe18 Joshua Saxe, Hillary Sanders:
Malware Data Science – Attack Detection and Attribution
No Starch Press Inc., San Franciso, USA, 2018. ISBN 978-1-5932-
7859-5
Saydjari18 O. Sami Saydjari:
Engineering Trustworthy Systems – Get Cybersecurity Design Right the First Time
McGraw Hill Education, N.Y., USA, 2018. ISBN 978-1-260-11817-9
Schmidt06 Klaus Schmidt:
High Availability and Disaster Recovery – Concepts, Design, Implementation
Springer-Verlag, 2006. ISBN 978-3-540-24460-8
Schneiderman15 Ron Schneiderman:
Modern Standardization – Case Studies at the Crossroads of
Technology, Economics, and Politics
Standards Information Network, 2015. ISBN 978-1-1186-7859-6
Schoenfield15 Brook S. E. Schoenfield:
Securing Systems – Applied Security Architecture and Threat
Models
CRC Press (Francis & Taylor), USA, 2015. ISBN 978-1-482-23397-
1
Scholz14 James A. Scholz:
Enterprise Architecture and Information Assurance –
Developing a Secure Foundation
Auerbach Publishin, USA, 2014. ISBN 978-1-439-84159-4
Schumacher05 Markus Schumacher, Eduardo Fernandez-Buglioni, Duane Hybertson, Frank Buschmann, Peter Somerlad:
Security Patterns: Integrating Security and Systems Engineering
John Wiley & Sons, USA, 2005.ISBN 978-0-470-85884-4
Segal16 Adam Segal:
The Hacked World Order – How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age
PublicAffairs, USA, 2016. ISBN 978-1-6103-9415-4
Selby17 Nick Selby, Heather Vescent:
Cyber Attack Survival Manual – From Identity Theft to The
Digital Apocalypse and Everything in Between
Weldon Owen Publishing, 2017. ISBN 978-1-6818-8175-1
Shemanske17 Thomas R. Shemanske:
Modern Cryptography and Elliptic Curves – A Beginner's Guide
American Mathematical Society, USA, 2017. ISBN 978-1-470-
43582-0
Sherwood05 John Sherwood:
Enterprise Security Architecture – A Business-Driven
Approach
McGraw-Hill Education Ltd., 2005. ISBN 978-1-578-20318-5
Smith10 David J. Smith, Kenneth G. L. Simpson:
Safety Critical Systems Handbook – A Straight forward Guide
to Functional Safety, IEC 61508 (2010 EDITION) and Related
Standards, Including Process IEC 61511 and Machinery IEC
62061 and ISO 13849
Butterworth-Heinemann Publishing, Oxford, UK, 3rd edition, 2010.
ISBN 978-0-080-96781-3
Smith11 David J. Smith, Kenneth G.L. Simpson:
Safety Critical Systems Handbook – A straightforward guide to functional safety, IEC 61508 and related standards
Butterworth-Heinemann (Elsevier), Oxford UK, 3rd edition, 2011.
ISBN 978-0-08-096781-3
Smith17 Sean Smith:
The Internet of Risky Things – Trusting the Devices That Surround Us
O'Reilly UK Ltd., 2017. ISBN 978-1-491-96362-3
Snedaker13 Susan Snedaker:
Business Continuity and Disaster Recovery Planning for IT
Professionals
Syngress Publisher, 2nd edition, 2013. ISBN 978-0-1241-0526-3
SolisTech16 Solis Tech:
Malware – Malware Detection & Threats Made Easy!
CreateSpace Independent Publishing Platform, 2nd edition, 2016.
ISBN 978-1-5236-9310-8
Song18 Houbing Song, Glenn A. Fink, Sabina Jeschke (Editors):
Security and Privacy in Cyber-Physical Systems –
Foundations, Principles, and Applications
John Wiley-IEEE Press, Chicester, UK, 2018. ISBN 978-1-119-
22604-8
Stevens11 Renee Stevens:
Engineering Mega-Systems – The Challenge of Systems
Engineering in the Information Age
Auerbach Publications, Taylor & Francis Group, Boca Raton, USA,
2011. ISBN 978-1-4200-7666-0
Stolfo09 Salvatore J. Stolfo, Steven M. Bellovin, Shlomo Hershkop, Angelos Keromytis, Sara Sinclair, Sean W. Smith (Editors):
Insider Attack and Cyber Security – Beyond the Hacker
Springer-Verlag, 2009. ISBN 978-1-441-94589-1
Sutton18 David Sutton:
Business Continuity in a Cyber World – Surviving
Cyberattacks
Business Expert Press, LLC, N.Y., 2018. ISBN 978-1-9474-4146-0
Talukder08 Asoke K. Talukder, Manish Chaitanya:
Architecting Secure Software Systems
Auerbach Publications (Taylor & Francis), FL, USA, 2008. ISBN
978-1-420-08784-0
Taylor14 Robert W. Taylor, Eric J. Fritsch, John Liederbach:
Digital Crime and Digital Terrorism
Prentice Hall, USA, 2014. ISBN 978-0-133-45890-9
Tornhill15 Adam Tornhill:
Your Code As a Crime Scene – Use Forensic Techniques to
Arrest Defects, Bottlenecks, and Bad Design in Your Programs
The Pragmatic Bookshelf, Dallas, USA, 2015. ISBN 978-1-68050-038-7
Vacca18 John R. Vacca:
Computer Forensics – Computer Crime Scene Investigation
Jones & Bartlett Publishing Inc., 3rd edition, 2018. ISBN 978-0-
7637-7997-9
Verma13 Ajit Kumar Verma, Srividya Ajit, Manoj Kumar:
Dependability of Networked Computer-based Systems
Springer, Heidelberg (Springer Series in Reliability Engineering),
2013. ISBN 978-1-447-12693-5
Volynkin09 Alexander Volynkin:
Modern Malicious Software – Taxonomy and Advanced
Detection Methods
VDM Verlag Dr. Müller, Germany, 2009. ISBN 978-3-6391-2295-4
Wahe11 Stefan Wahe:
Open Enterprise Security Architecture – A Framework and Template for Policy-Driven Security
Van Haren Publishing, 2011. ISBN 978-9-0875-3672-5
Wall07 David S. Wall:
Cybercrime – The Transformation of Crime in the Information Age
Polity Press, Cambridge, UK, 2007. ISBN 978-0-7456-2736-6
Warwick1990 K. Warwick, M.T. Tham (Editors):
Failsafe Control Systems - Applications and emergency
management
Springer-Verlag, 1991. ISBN 978-0-412-37740-2
Wheeler11 Evan Wheeler
Security Risk Management – Building an Information Security
Risk Management Program from the Ground Up
Syngress Publishing, USA, 2011. ISBN 978-1-5974-9615-5
White18 ichard A. White:
Cybercrime – The Madness Behind the Methods
CreateSpace Independent Publishing Platform, 2018. ISBN 978-1-
9798-4857-2
Wong00 Caroline Wong:
Security Metrics - A Beginner's Guide
Osborne Publisher,2000. ISBN 978-0-071-74400-3
Wong18 W. Wong:
The Risk Management of Safety and Dependability – A Guide
for Directors, Managers and Engineers
Woodhead Publishing, 2018. ISBN 978-0-0810-1439-4
Yang17 Mengfei Yang, Gengxin Hua, Yanjun Feng, Jian Gong:
Fault Tolerance Techniques for Spacecraft Control Computers
John Wiley & Sons Inc., USA, 2017. ISBN 978-1-119-10727-9
Young10 Carl Young:
Metrics and Methods for Security Risk Management
Syngress Publishing, 2010. ISBN 978-1-8561-7978-2
Yu14 Shui Yu:
Distributed Denial of Service Attack and Defense
Springer-Verlag, 2014. ISBN 978-1-461-49490-4
Zongo18a Phillimon Zongo:
The Five Anchors of Cyber-Resilience – Why some Enterprises
are hacked into Bankruptcy while others easily bounce back
Broadcast Books, Australia, 2018. ISBN 978-0-6480078-4-5
Zongo18b Phillimon Zongo:
The Five Anchors of Cyber Resilience – Why some enterprises
are hacked into bankruptcy, while others easily bounce back
CISO Advisory, 2018. ISBN 978-0-6480-0784-5